Reports and Papers Archive

Page Content


Browse All Papers »       Submit A Paper »

Internet Security Handbook

S.W. Smith, G.G. Christoph
Added 2002-07-26

Information Warfare: Selected Long-Range Technology Applications

W.J. Barlow, Project Leader; R.D. Turner, Deputy Project Leader
Added 2002-07-26

The RC6 Block Cipher

Ronald L. Rivest, M.J.B. Robshaw, R. Sidney, Y.L. Yin

We introduce the RC6 block cipher. RC6 is an evolutionary improvement of RC5, designed to meet the requirements of the Advanced Encryption Standard (AES). Like RC5, RC6 makes essential use of data-dependent rotations. New features of RC6 include the use of four working registers instead of two, and the inclusion of integer multiplication as an additional primitive operation. The use of multiplication greatly increases the diffusion achieved per round, allowing for greater security, fewer rounds, and increased throughput.

Added 2002-07-26

Mathematics, Technology, and Trust: Formal Verification, Computer Security, and the U.S. Military

Donald MacKenzie, Garrel Pottinger

A distinctive concern in the U.S. military for computer security dates from the emergence of time-sharing systems in the 1960s.  This paper traces the subsequent dvelopment of the idea of a \“security kernel\” and of the mathmtical modeling of security, focusing in particular on the paradigmatic Bell LaPadula model.  The paper examines the connections between security and formal , deductiv verification of the properties of computer systems.  It goes on to discuss differencs between the cultures of communications security and computer security, the bureaucratic turf war over security, and the emergence and impact of the Department of Defense\‘s Trusted Computer System Evaluation Criteria (the so-called Orange Book), which effectively took its final form in 1983.  The paper ends by outlining the fragmentation of computer security since the Orange Book was written.

Added 2002-07-26

NOT the Orange Book

Paul H. Merrill
Added 2002-07-26